cloud security
Malware that spreads via Redis now capable of deploying ransomware
P2Pinfect now able to deploy ransomware and crypto miner payloads.
cloud security
P2Pinfect now able to deploy ransomware and crypto miner payloads.
Cybersecurity
Camera emoji? "Take a screenshot of the victim's screen and upload it to the command channel as an attachment."
Cybersecurity
Malware operators “have established a significant presence in data centers worldwide”Â
News
A new variant of the Kremlin-backed Sandworm software known as Kapeka has been found in the wild
News
An international law enforcement campaign has struck a lethal blow to the long-running Qakbot malware and botnet operation
malware
A months-long malware campaign was seen exploiting a zero-day flaw in WinRAR for spear-phishing attacks aimed at traders and finance professionals
News
A newly-spoted proxyjacking campaign is going above and beyond to hide itself from detection
Cybersecurity
Threat actors are using SEO to trick users into downloading ransomware.
malware
The bootkit has been sold on underground forums since at least October 6, 2022. It has a tiny on-disk size of around 80kb, can disable HVCI, Windows Defender, BitLocker, and bypass UAC
Featured
Highly sophisticated malware had been refined for over 20 years
Cybersecurity
Signature-based detection is dying hard.
Cybersecurity
Pshaw “no material adverse impact”